| Seed / Pre-Product | Prevent obvious incidents and credential leaks | SSO + MFA for staff; least-privilege IAM; encrypted secrets store; repo secret scanning; dependency scanning; automatic patching; basic logging; device hardening | No production prompts with PII; block model training on your data; log prompts locally with retention policy; choose providers with DPAs |
| Post-MVP / Pre-Series A | Make production safe to operate | Access reviews (quarterly); environment separation; centralized logs with alerting; backup & restore drills; vulnerability management with SLAs; runbooks for common incidents; vendor inventory and DPAs | Prompt and output logging with redaction; basic evaluation suite (accuracy/safety); token budgets and alerts per environment |
| Series A | Reliability, customer trust, and deal unblockers | SLOs and error budgets; change policy (feature flags/canaries/rollback); DLP for customer data; data map and retention; penetration test; security awareness training; formal incident response | Evaluation parity across providers; model/version registry; safety filters; fallbacks; cache strategy and context compression for cost control |
| Series B–C | Enterprise-readiness and audit evidence | Formal risk register; tiered vendor risk; SOC2 readiness (policies/controls evidence); advanced IAM (Just-in-time, break-glass); key rotation program; infra as code with policy enforcement | Provider optionality abstraction; bias/toxicity evals; private or region-bound inference where needed; SLA/SLOs with AI vendors |
| Mature / Scale | Program durability and continuous improvement | ISO 27001 (if demanded), continuous compliance tooling, tabletop exercises, red-teaming, chaos/DR game days, privacy DPIA/PIA process, automated access reviews | Automated drift detection; adversarial testing; model monitoring for quality, drift, and latency; periodic re-benchmarking |